Arnold's summary of Clinton's statement is correct, but it seems as though 
the law differentiates between *crypto-encounters* and 
*unbreakable-crypto-encounters*. From the text of the enrolled (final) 
version of the bill:

http://thomas.loc.gov/cgi-bin/bdquery/z?d106:s.01769:
(a) Section 2519(2)(b) of title 18, United States Code, is amended by 
striking `and (iv)' and inserting `(iv) the number of orders in which 
encryption was encountered and whether such encryption prevented law 
enforcement from obtaining the plain text of communications intercepted 
pursuant to such order, and (v)'.

I hope that means the Justice Department and the administrative office of 
the US courts will break down those numbers into two seperate columns in 
the annual reports.

-Declan

At 08:58 5/5/2000 -0400, Arnold G. Reinhold wrote:
>It's worse than that. The new reports are to cover "law enforcement 
>encounters with encrypted communications in the execution of wiretap 
>orders." http://www.politechbot.com/docs/clinton-crypto.050300.html 
>"Encounters" suggests that there will be no distinction between encryption 
>that hinders law enforcement access and encryption that does not. For 
>example, any tap of a GSM cell phone could be reported even though the 
>cipher GSM uses is relatively easy to break.  In 1999 there were 676 
>authorized taps for cell phones and pagers vs. 399 for stationary phones. 
>(1998: 576 vs 494, so the trend is toward cell phones)
>
>They might even count code-division multiplexing as encryption.  That 
>could sweep in many cordless phones used on the stationary lines as well. 
>Expect reports that imply encryption is a huge problem for wire taps.
>
>Arnold Reinhold



Reply via email to